bTCGXRT|PX_
erttyutyio7aszgfdg
ioewoewrutkreyrt
Static task
static1
Behavioral task
behavioral1
Sample
5ec1233642d9a701231a95fd4e36c4e3_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5ec1233642d9a701231a95fd4e36c4e3_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5ec1233642d9a701231a95fd4e36c4e3_JaffaCakes118
Size
74KB
MD5
5ec1233642d9a701231a95fd4e36c4e3
SHA1
32a02980d550911f5b11397dfb7b29f06ead598d
SHA256
219febce66d34f8ae759002a7e0eb2f84c96421b0f5ef9179024ae83db5309b8
SHA512
fae09070413e249d676440dfde3c729d77f219d82ac3d4ebb79ed8e9015ba4e2d7726240c172e34a4001f338399745fcd38e187689087001eaf6d66a2e0f283e
SSDEEP
768:CGdukKIEvziZtjYfIno71kj4zHFmTBAoxwDi2Lwu3n27dPzTX3eMQGkSV62Fo:ltKfKYAoraKLt0dPWMwSs2
Checks for missing Authenticode signature.
resource |
---|
5ec1233642d9a701231a95fd4e36c4e3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
OpenInputDesktop
GetThreadDesktop
SendInput
SetCursorPos
PostMessageA
OpenDesktopA
SetThreadDesktop
GetForegroundWindow
UnhookWindowsHookEx
SetWindowsHookExW
GetWindowTextA
GetWindowThreadProcessId
wsprintfW
ExitWindowsEx
wsprintfA
CallNextHookEx
RegisterDeviceNotificationA
OpenWindowStationA
SetProcessWindowStation
DestroyWindow
CloseDesktop
CloseWindowStation
TranslateMessage
DispatchMessageA
CreateWindowExA
PostThreadMessageA
LoadIconA
LoadCursorA
GetSystemMetrics
LoadImageA
RegisterClassExA
ShowWindow
BringWindowToTop
UpdateWindow
EnumWindows
CharUpperA
CharLowerA
GetActiveWindow
GetMessageA
CreateDCA
GetDIBits
CreateCompatibleBitmap
DeleteObject
GetStockObject
GetDeviceCaps
DeleteDC
CreateCompatibleDC
SelectObject
BitBlt
RegOpenKeyExA
AdjustTokenPrivileges
OpenThreadToken
ImpersonateSelf
RegisterServiceCtrlHandlerA
SetServiceStatus
LogonUserA
CreateProcessAsUserA
OpenProcessToken
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
QueryServiceConfigA
EnumServicesStatusA
ControlService
ChangeServiceConfigA
RegCreateKeyExA
RegSetValueExA
DeleteService
CreateServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
StartServiceA
LookupPrivilegeValueA
RegQueryValueExA
RegCloseKey
GetUserNameW
StrChrA
StrStrA
SHEmptyRecycleBinA
StrRChrA
ShellExecuteA
StrCmpNIA
SHFileOperationA
CreateStreamOnHGlobal
WSAStartup
connect
htons
setsockopt
inet_ntoa
gethostbyname
inet_addr
recv
select
closesocket
send
socket
StrCmpW
StrToIntA
SHDeleteKeyA
GetModuleFileNameExA
ImmGetCompositionStringA
ImmGetCompositionStringW
ImmReleaseContext
ImmGetContext
srand
time
rand
__dllonexit
_onexit
_initterm
_adjust_fdiv
getenv
strrchr
malloc
wcscmp
free
strchr
_beginthread
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
GetFileSize
OpenMutexA
OpenEventA
lstrcatW
lstrlenW
FlushFileBuffers
SetFilePointer
WideCharToMultiByte
SearchPathA
GetModuleFileNameA
OpenProcess
GetFileAttributesExA
CreateDirectoryA
MoveFileA
GetDriveTypeA
GetVolumeInformationA
GetDiskFreeSpaceExA
FindClose
GetLastError
FindNextFileA
lstrcmpA
FindFirstFileA
GetLogicalDriveStringsA
lstrcmpiA
GetCurrentProcessId
TerminateProcess
DuplicateHandle
SetStdHandle
CreatePipe
GetStdHandle
CopyFileA
GetProcAddress
FreeLibrary
LocalAlloc
InterlockedExchange
GlobalLock
lstrcpyW
WaitForMultipleObjects
ResetEvent
ReleaseMutex
GlobalFree
CreateEventA
CreateMutexA
GetFileSizeEx
SetFilePointerEx
ReadFile
GetCurrentProcess
GetPriorityClass
GetThreadPriority
SetPriorityClass
SetThreadPriority
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersion
GetVersionExA
GetSystemInfo
GlobalMemoryStatus
GetComputerNameA
GetACP
GetOEMCP
GetLocalTime
lstrlenA
GetTempPathA
GetCurrentThreadId
CreateFileA
WriteFile
CloseHandle
RaiseException
LoadLibraryA
GlobalAlloc
GetCurrentThread
GetSystemDirectoryA
DeleteFileA
SetEvent
GetStartupInfoA
lstrcatA
CreateProcessA
lstrcpyA
Sleep
WaitForSingleObject
GetTickCount
bTCGXRT|PX_
erttyutyio7aszgfdg
ioewoewrutkreyrt
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ